首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   551篇
  完全免费   43篇
  自动化技术   594篇
  2018年   8篇
  2017年   11篇
  2016年   9篇
  2015年   13篇
  2014年   24篇
  2013年   17篇
  2012年   23篇
  2011年   34篇
  2010年   19篇
  2009年   44篇
  2008年   48篇
  2007年   37篇
  2006年   35篇
  2005年   40篇
  2004年   42篇
  2003年   39篇
  2002年   27篇
  2001年   15篇
  2000年   13篇
  1999年   13篇
  1998年   11篇
  1997年   14篇
  1996年   11篇
  1995年   7篇
  1994年   1篇
  1993年   1篇
  1992年   2篇
  1991年   4篇
  1990年   1篇
  1989年   2篇
  1988年   5篇
  1987年   2篇
  1986年   3篇
  1985年   4篇
  1984年   3篇
  1981年   4篇
  1980年   1篇
  1979年   1篇
  1978年   2篇
  1977年   1篇
  1976年   2篇
  1971年   1篇
排序方式: 共有594条查询结果,搜索用时 187 毫秒
1.
Automatic text segmentation and text recognition for video indexing   总被引:12,自引:0,他引:12  
Efficient indexing and retrieval of digital video is an important function of video databases. One powerful index for retrieval is the text appearing in them. It enables content-based browsing. We present our new methods for automatic segmentation of text in digital videos. The algorithms we propose make use of typical characteristics of text in videos in order to enable and enhance segmentation performance. The unique features of our approach are the tracking of characters and words over their complete duration of occurrence in a video and the integration of the multiple bitmaps of a character over time into a single bitmap. The output of the text segmentation step is then directly passed to a standard OCR software package in order to translate the segmented text into ASCII. Also, a straightforward indexing and retrieval scheme is introduced. It is used in the experiments to demonstrate that the proposed text segmentation algorithms together with existing text recognition algorithms are suitable for indexing and retrieval of relevant video sequences in and from a video database. Our experimental results are very encouraging and suggest that these algorithms can be used in video retrieval applications as well as to recognize higher level semantics in videos.  相似文献
2.
An introduction to RFID technology   总被引:11,自引:0,他引:11  
In recent years, radio frequency identification technology has moved from obscurity into mainstream applications that help speed the handling of manufactured goods and materials. RFID enables identification from a distance, and unlike earlier bar-code technology, it does so without requiring a line of sight. In this paper, the author introduces the principles of RFID, discusses its primary technologies and applications, and reviews the challenges organizations will face in deploying this technology.  相似文献
3.
基于X86架构的系统虚拟机技术与应用   总被引:11,自引:2,他引:9       下载免费PDF全文
介绍了基于X86的主流泛虚拟化(Paravirtualization)及完全虚拟化技术(Full-virtualization)尤其是芯片虚拟化技术的支持。描述了两个实现泛虚拟化技术的系统虚拟机Denali及XEN,阐述了完全虚拟化的发展现状,以及支持两种技术结合的解决方案,展望了虚拟机技术的发展前景及其应用。  相似文献
4.
Parallel Data Mining for Association Rules on Shared-Memory Systems   总被引:10,自引:0,他引:10  
In this paper we present a new parallel algorithm for data mining of association rules on shared-memory multiprocessors. We study the degree of parallelism, synchronization, and data locality issues, and present optimizations for fast frequency computation. Experiments show that a significant improvement of performance is achieved using our proposed optimizations. We also achieved good speed-up for the parallel algorithm. A lot of data-mining tasks (e.g. association rules, sequential patterns) use complex pointer-based data structures (e.g. hash trees) that typically suffer from suboptimal data locality. In the multiprocessor case shared access to these data structures may also result in false sharing. For these tasks it is commonly observed that the recursive data structure is built once and accessed multiple times during each iteration. Furthermore, the access patterns after the build phase are highly ordered. In such cases locality and false sharing sensitive memory placement of these structures can enhance performance significantly. We evaluate a set of placement policies for parallel association discovery, and show that simple placement schemes can improve execution time by more than a factor of two. More complex schemes yield additional gains. Received 24 May 1999 / Revised 20 June 2000 / Accepted in revised form 6 July 2000  相似文献
5.
Basic Fuzzy Logic is the logic of continuous t-norms and their residua   总被引:9,自引:1,他引:8  
In this paper we prove that Basic Logic (BL) is complete w.r.t. the continuous t-norms on [0, 1], solving the open problem posed by Hájek in [4]. In fact, Hájek proved that such completeness theorem can be obtained provided two new axioms, B1 and B2, were added to the original axioms of BL. The main result of the paper is to show that B1 and B2 axioms are indeed redundant. We also obtain an improvement of the decomposition theorem for saturated BL-chains as ordinal sums whose components are either MV, product or Gödel chains, in an analogous way as for continuous t-norms. Finally we provide equational characterizations of the variety of BL-algebras generated by the three basic BL subvarieties, as well as of the varieties generated by each pair of them, together with completeness results of the calculi corresponding to all these subvarieties.  相似文献
6.
Watermarking 3D objects for verification   总被引:7,自引:0,他引:7  
We introduce and investigate the fundamental similarities and differences of watermarking 3D graphic models compared to 2D images, and propose some solutions to address a class of applications of digital watermarking-the verification of 3D polygonal models. To our knowledge, watermarking of 3D objects for verification purposes has not been addressed in any published literature. The proposed scheme, in its present form, is not intended for use in applications that require robust watermarks. One recent work in 3D data hiding addressed applications requiring robust means of hiding data. We first introduce digital watermarking, discuss its goals and application domains, and explain the different categories of watermarks. We believe the goals and applications will remain fairly similar for 2D images and 3D models  相似文献
7.
Motion segmentation and pose recognition with motion history gradients   总被引:7,自引:0,他引:7  
This paper presents a fast and simple method using a timed motion history image (tMHI) for representing motion from the gradients in successively layered silhouettes. This representation can be used to (a) determine the current pose of the object and (b) segment and measure the motions induced by the object in a video scene. These segmented regions are not “motion blobs”, but instead are motion regions that are naturally connected to parts of the moving object. This method may be used as a very general gesture recognition “toolbox”. We demonstrate the approach with recognition of waving and overhead clapping motions to control a music synthesis program. Accepted: 13 August 2001  相似文献
8.
Interactive volume navigation   总被引:6,自引:0,他引:6  
Volume navigation is the interactive exploration of volume data sets by “flying” the viewpoint through the data, producing a volume rendered view at each frame. We present an inexpensive perspective volume navigation method designed to be run on a PC platform with accelerated 3D graphics hardware. The heart of the method is a two-phase perspective ray casting algorithm that takes advantage of the coherence inherent in adjacent frames during navigation. The algorithm generates a sequence of approximate volume-rendered views in a fraction of the time that would be required to compute them individually. The algorithm handles arbitrarily large volumes by dynamically swapping data within the current view frustum into main memory as the viewpoint moves through the volume. We also describe an interactive volume navigation application based on this algorithm. The application renders gray-scale, RGB, and labeled RGB volumes by volumetric compositing, allows trilinear interpolation of sample points, and implements progressive refinement during pauses in user input  相似文献
9.
10.
Vineyard computing: sensor networks in agricultural production   总被引:6,自引:0,他引:6  
Using ethnographic research methods, the authors studied the structure of the needs and priorities of people working in a vineyard to gain a better understanding of the potential for sensor networks in agriculture. We discuss an extended study of vineyard workers and their work practices to assess the potential for sensor network systems to aid work in this environment. The major purpose is to find new directions and new topics that pervasive computing and sensor networks might address in designing technologies to support a broader range of users and activities.  相似文献
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号